Loading [MathJax]/extensions/MathMenu.js
Balasubramaniam Natarajan - IEEE Xplore Author Profile

Showing 1-25 of 256 results

Filter Results

Show

Results

While semantic communication has become an active area of research, a unifying theoretical foundation remains elusive. In this letter, we aim to partly fill this gap by providing a new perspective on goal-oriented semantic rate distortion theory. We extend the classical rate distortion model to include a semantic encoder and decoder, and define achievability with respect to the task distortion. We...Show More
This letter introduces a novel approach for online bad data detection in distribution system state estimation (DSSE) by integrating compressive sensing (CS) with a modified largest normalized residual (LNR)-based detector. To the best of the authors’ knowledge, this is the first work to develop a bad data detection method specifically for CS-based DSSE in unobservable distribution networks. The pa...Show More
Semantic communication is a paradigm shift toward meaning-oriented communication that is largely enabled by artificial intelligence technologies. One approach to semantic communication that leverages this intelligence is based on the theory of conceptual spaces. However, learning these conceptual spaces in an automated fashion is a major challenge. Moreover, the true intelligence of semantic commu...Show More
The conventional paradigm of communication primarily concentrates on the transmission of raw data, often disregarding its contextual meaning. However, to tackle the exponential growth in data demands along with the limited availability of transmission bandwidth, there is an increasing need to transition from Shannon’s classical information-theoretic communication to a more advanced framework cente...Show More
In today’s world of rapidly growing technological markets, image processing has become vital for systems to work on visual data. A noteworthy task would be lane detection in autonomous vehicles. A good lane detection system should be able to perform the processing irrespective of the environment and this mandates that adequate preprocessing should be done. One such preprocessing step is image deha...Show More
Corrosion is a persistent issue for maintenance teams across industries. Any corrosion left undetected can cause significant damage to infrastructure, equipment and machinery posing a threat to the safety of the workers and crews leading to substantial repairs. Standard corrosion detection methods relying on manual inspection by workers are found to be insufficient, being slow and often overlookin...Show More
Cirrhosis manifests as a condition wherein healthy liver tissue is gradually replaced by scar tissue, resulting in a decline in liver function. This ailment frequently correlates with autoimmune disorders, non-alcoholic fatty liver disease, excessive alcohol intake, and persistent liver conditions such as hepatitis B or C. As cirrhosis progresses, it can cause liver failure and various complicatio...Show More
The introduction of transformer models, which utilize a self-attention mechanism within deep neural networks, represents a notable breakthrough in natural language processing. This advancement has spurred researchers to investigate its applicability in computer vision tasks. Transformer-based models have showcased remarkable performance compared to traditional convolutional and recurrent neural ne...Show More
Communication with the goal of accurately conveying meaning, rather than accurately transmitting symbols, has become an area of growing interest. This paradigm, termed semantic communication, typically leverages modern developments in artificial intelligence and machine learning to improve the efficiency and robustness of communication systems. However, a standard model for capturing and quantifyi...Show More
In recent years, the issue of homelessness has gained significant attention as societies grapple with finding solutions to alleviate the plight of those without stable shelter. To address this pressing concern, this research utilizes advanced video analysis techniques, specifically Vision Transformer, to detect the presence of individuals in homeless populations. By leveraging state-of-the-art tec...Show More
This paper proposes a learning-based approach to identify vulnerabilities in interconnected infrastructure networks. For the first time, in contrast to purely network-based metrics (like degree and eigenvector centrality), our approach incorporates performance-based feature metrics in vulnerability assessment. Our primary goal is the creation of a scalable, adaptable framework for vulnerability an...Show More
Influenza A, a zoonotic virus potentially affecting and infecting humans, poses a significant global health threat. This research paper presents a comprehensive study on predicting Influenza A outbreaks by applying the XGBoost classification algorithm. The study utilizes two substantial datasets: one from the World Health Organization (WHO) containing global Influenza A epidemiological data from 2...Show More
The Internet of Things (IoT) is a fast-expanding field, with applications in areas as diverse as transportation, aviation, automation, electricity, and healthcare. Sensors, protocols, actuators, cloud services, and layers are just few of the components that make up an IoT architecture. The architecture of the Internet of Things is crucial in delivering the goods. The research community now provide...Show More
Analyzing finances has become increasingly challenging in today’s investment landscape, where making valuable and informed investment decisions is crucial. The fluctuation of share prices plays a pivotal role in determining investors’ profits or losses. Current forecasting techniques encompass both linear and non-linear algorithms. However, these methods primarily emphasize forecasting changes in ...Show More
Lung and colon cancers are significant health issues across the world, prompting the need for inventive methods of diagnosis. This study takes the lead in introducing advanced Deep ConvNets (CNNs) to enhance the accuracy of early detection. The model is trained on extensive datasets, resulting in impressive outcomes. During training, it achieves an accuracy of 92.54% and a loss value of 0.0161. Th...Show More
The increasing amount of underwater visual data and deep sea research have led to the rise of marine animal identification as a major field for data processing and analysis. The need to protect the ecosystem emphasizes how important this endeavor is, yet it’s still difficult because of things like the complexities of underwater backdrops, poor picture and video quality, and the variety of movement...Show More
Zero-dynamics stealthy attacks are a subset of false data injection attacks (FDIAs) that can be catastrophic as they are designed to be undetectable by traditional residual based anomaly detectors. The attacker’s ability to successfully attack a system relies heavily on their capacity to learn an accurate state space model. Utilizing a grey box approach to system identification, we show that even ...Show More
Deep reinforcement learning (DRL) has empowered a variety of artificial intelligence fields, including pattern recognition, robotics, recommendation systems, and gaming. Similarly, graph neural networks (GNNs) have also demonstrated their superior performance in supervised learning for graph-structured data. In recent times, the fusion of GNN with DRL for graph-structured environments has attracte...Show More
Grammatical Error Correction is a crucial task in Natural Language Processing. This paper discusses the evolution of grammar error correction models from early rule-based approaches to advanced deep learning-based methodologies. This work utilizes the NAIST Lang-8 dataset, a valuable dataset offering parallel data, facilitating more straightforward evaluation and eliminating the need for additiona...Show More
Human mobility is restricted due to many causes like old age, health conditions, accidents etc. The present paper introduces an innovative approach for interacting with a virtual mouse through hand gestures, leveraging the combined capabilities of MediaPipe, OpenCV, and PyAutoGUI and its capability in identifying hand gestures and translating them into actionable commands. OpenCV enhances gesture ...Show More
A crucial diagnostic tool for respiratory and heart disorders is chest X-ray imaging. However, the limited resolution of acquired images can hinder accurate interpretation and subsequent treatment decisions. To address this challenge, we employ deep learning-based super-resolution techniques, specifically SRGAN and ESPCN, to enhance the chest X-ray images. In this study, we proposed a modified ESP...Show More
This research’s primary goal is to create a system for detecting sign language. Sign language has long been accepted as a genuine mode of communication for people who are having hearing-impaired problems. The inability of technology to detect and comprehend sign language has limited its usage in daily life. This research will look at many ways to sign language detection, such as image and video pr...Show More
Cryptocurrency price prediction is a complex and dynamic task. Cryptocurrencies are highly volatile digital assets impacted by a wide range of variables, including investor mood, legislative changes, market demand, and technical breakthroughs. This research presents a novel approach to cryptocurrency price prediction using Deep Reinforcement Learning (DRL). The proposed model incorporates proximal...Show More
Trading stocks requires effective methodologies to succeed in the business process. Automated stock trading involves utilizing computer algorithms and software programs to execute stock market trades automatically. This research work proposes an ensemble approach that leverages deep reinforcement learning to discover a stock trading strategy aimed at maximizing investment returns. By employing thr...Show More
Reinforcement learning has emerged as a prominent technique for enhancing robot obstacle avoidance capabilities in recent years. This research provides a comprehensive overview of reinforcement learning methods, focusing on Bayesian, static, dynamic policy, Deep Q-Learning (DQN) and extended dynamic policy algorithms. In the context of robot obstacle avoidance, these algorithms enable an agent to ...Show More